Guarded dual authentication based DRM with resurgence dynamic encryption techniques
Cloud computing is the emergent technology that face one of the significant issues time with data security while outsourcing the data onto the cloud in recent. Some cryptographic techniques have been used for protection in form of identity, attributes and prediction algorithms nonetheless these algo...
Uložené v:
| Vydané v: | Enterprise information systems Ročník 13; číslo 3; s. 257 - 280 |
|---|---|
| Hlavní autori: | , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Taylor & Francis
16.03.2019
|
| Predmet: | |
| ISSN: | 1751-7575, 1751-7583 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Cloud computing is the emergent technology that face one of the significant issues time with data security while outsourcing the data onto the cloud in recent. Some cryptographic techniques have been used for protection in form of identity, attributes and prediction algorithms nonetheless these algorithms lack their performance and becomes are very prone to attackers when an unauthorized user reunited the system with dissimilar way for privileges to the similar data files. The essential need of this data security solved by some enhanced cryptographic techniques in DRM utilizing a secure privacy preserving data sharing with encryption techniques of Dynamic Unidirectional Proxy Re-Encryption. This technique is based on Cipher text Policy Attribute by providing the privacy, integrity and security of the data while retrieving. |
|---|---|
| AbstractList | Cloud computing is the emergent technology that face one of the significant issues time with data security while outsourcing the data onto the cloud in recent. Some cryptographic techniques have been used for protection in form of identity, attributes and prediction algorithms nonetheless these algorithms lack their performance and becomes are very prone to attackers when an unauthorized user reunited the system with dissimilar way for privileges to the similar data files. The essential need of this data security solved by some enhanced cryptographic techniques in DRM utilizing a secure privacy preserving data sharing with encryption techniques of Dynamic Unidirectional Proxy Re-Encryption. This technique is based on Cipher text Policy Attribute by providing the privacy, integrity and security of the data while retrieving. |
| Author | Agarwal, Neha Pandey, J.P. Rana, Ajay |
| Author_xml | – sequence: 1 givenname: Neha surname: Agarwal fullname: Agarwal, Neha email: agarwalnehajain@gmail.com organization: Department of Computer Science Engineering, Amity University – sequence: 2 givenname: Ajay surname: Rana fullname: Rana, Ajay organization: Department of Computer Science Engineering, Amity University – sequence: 3 givenname: J.P. surname: Pandey fullname: Pandey, J.P. organization: Department of Electrical Engineering, KNIT |
| BookMark | eNp9kNtKw0AQhhepYFt9BCEvkLq7yR56p1StQkXwcL3sYWJX0k3dTSh5e1NbvRQGZv6Z-f-Lb4JGoQmA0CXBM4IlviKCDSXYjGIiZ4RRgUtygsb7fS6YLEZ_s2BnaJLSJ8ZcYsHG6HXZ6ejAZa7Tdaa7dg2h9Va3vgmZ0Wm43L48ZTvfrrMIqYsfECxkrg964202iNhvf55bsOvgvzpI5-i00nWCi2Ofovf7u7fFQ756Xj4ubla5pUy2OTdcutLMiS6cJtYwwGAKI2Fubcm5MabkugLBOKECKk556cq5xYRQoI7qYorYIdfGJqUIldpGv9GxVwSrPRn1S0btyagjmcF3ffD5UDVxo3dNrJ1qdV83sYo6WJ9U8X_ENypWbj0 |
| Cites_doi | 10.1016/j.jnca.2013.05.006 10.1109/TMC.2017.2693990 10.1080/17517575.2011.654266 10.1016/j.future.2015.11.012 10.14569/issn.2156-5570 10.1016/j.is.2013.08.004 10.1007/978-3-642-14478-3_40 10.1109/TMC.2014.2362760 10.1016/j.jnca.2012.07.007 10.1109/TII.2011.2167156 10.1007/978-3-319-46608-8_2 10.1109/APNOMS.2015.7275375 10.1109/JSYST.2014.2379646 10.1002/sec.v7.11 10.1007/s12204-014-1514-6 10.1016/j.jnca.2016.09.002 10.1007/s11276-014-0788-9 10.1016/j.eswa.2014.06.027 10.17485/ijst/2015/v8i12/52923 10.1016/j.pmcj.2015.06.016 10.1016/j.ins.2016.09.005 10.1109/TIFS.2012.2223683 10.1109/TC.2013.200 10.1016/j.jss.2014.11.050 10.1109/TCC.2015.2398426 10.1016/j.is.2014.05.004 10.1109/TKDE.2016.2580139 |
| ContentType | Journal Article |
| Copyright | 2018 Informa UK Limited, trading as Taylor & Francis Group 2018 |
| Copyright_xml | – notice: 2018 Informa UK Limited, trading as Taylor & Francis Group 2018 |
| DBID | AAYXX CITATION |
| DOI | 10.1080/17517575.2018.1527041 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1751-7583 |
| EndPage | 280 |
| ExternalDocumentID | 10_1080_17517575_2018_1527041 1527041 |
| Genre | Article |
| GroupedDBID | .7F 0BK 0R~ 30N 4.4 8VB AAGDL AAHIA AAJMT AALDU AAMIU AAPUL AAQRR ABCCY ABFIM ABJNI ABLIJ ABPAQ ABPEM ABTAI ABXUL ABXYU ACGFS ACTIO ADCVX ADGTB ADMLS AEISY AENEX AEYOC AFRVT AGDLA AHDZW AHQJS AIJEM AIYEW AKBVH AKOOK AKVCP ALMA_UNASSIGNED_HOLDINGS ALQZU AQRUH AQTUD AVBZW AWYRJ BLEHA CCCUG CE4 CS3 DGEBU DKSSO DU5 EBS EBU EJD E~A E~B GTTXZ H13 HZ~ H~P IPNFZ J~4 K1G KYCEM LJTGL M4Z MK~ O9- P2P QWB RIG RNANH ROSJB RTWRZ S-T SNACF TASJS TBQAZ TDBHL TEN TFL TFT TFW TH9 TTHFI TUROJ TWF TWQ UT5 UU3 ZGOLN ZL0 AAYXX CITATION |
| ID | FETCH-LOGICAL-c258t-6b68d4b91a3da1cb5e0eb3b8e9cc466bbb46afe756127ef6264d49c0112e2d2a3 |
| IEDL.DBID | TFW |
| ISICitedReferencesCount | 1 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000458239600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1751-7575 |
| IngestDate | Sat Nov 29 06:46:09 EST 2025 Mon Oct 20 23:49:45 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c258t-6b68d4b91a3da1cb5e0eb3b8e9cc466bbb46afe756127ef6264d49c0112e2d2a3 |
| PageCount | 24 |
| ParticipantIDs | informaworld_taylorfrancis_310_1080_17517575_2018_1527041 crossref_primary_10_1080_17517575_2018_1527041 |
| PublicationCentury | 2000 |
| PublicationDate | 3/16/2019 2019-03-16 |
| PublicationDateYYYYMMDD | 2019-03-16 |
| PublicationDate_xml | – month: 03 year: 2019 text: 3/16/2019 day: 16 |
| PublicationDecade | 2010 |
| PublicationTitle | Enterprise information systems |
| PublicationYear | 2019 |
| Publisher | Taylor & Francis |
| Publisher_xml | – name: Taylor & Francis |
| References | CIT0030 CIT0010 CIT0031 CIT0012 CIT0011 Patil K. (CIT0018); 4 CIT0014 CIT0013 CIT0016 CIT0015 CIT0017 Spandana B. (CIT0025) 2016; 08 CIT0020 CIT0001 CIT0023 CIT0022 Rafeeq M. D. (CIT0019) 2015; 3 CIT0003 Sandhu G. K. (CIT0021) 2016; 6 CIT0002 CIT0024 CIT0005 CIT0027 CIT0004 CIT0026 CIT0007 CIT0029 CIT0006 CIT0028 CIT0009 CIT0008 |
| References_xml | – ident: CIT0005 doi: 10.1016/j.jnca.2013.05.006 – ident: CIT0006 doi: 10.1109/TMC.2017.2693990 – volume: 4 start-page: 1101 ident: CIT0018 publication-title: International Research Journal of Engineering and Technology (IRJET) – ident: CIT0013 doi: 10.1080/17517575.2011.654266 – volume: 6 start-page: 2 year: 2016 ident: CIT0021 publication-title: Global Journal of Computer Science and Technology – ident: CIT0016 doi: 10.1016/j.future.2015.11.012 – ident: CIT0001 doi: 10.14569/issn.2156-5570 – ident: CIT0020 doi: 10.1016/j.is.2013.08.004 – ident: CIT0003 doi: 10.1007/978-3-642-14478-3_40 – volume: 3 start-page: 1086 issue: 3 year: 2015 ident: CIT0019 publication-title: International Journal of Computer Science and Engineering – ident: CIT0017 doi: 10.1109/TMC.2014.2362760 – ident: CIT0024 doi: 10.1016/j.jnca.2012.07.007 – ident: CIT0008 doi: 10.1109/TII.2011.2167156 – ident: CIT0026 doi: 10.1007/978-3-319-46608-8_2 – ident: CIT0027 doi: 10.1109/APNOMS.2015.7275375 – ident: CIT0002 doi: 10.1109/JSYST.2014.2379646 – ident: CIT0011 doi: 10.1002/sec.v7.11 – ident: CIT0029 doi: 10.1007/s12204-014-1514-6 – ident: CIT0023 doi: 10.1016/j.jnca.2016.09.002 – ident: CIT0007 doi: 10.1007/s11276-014-0788-9 – ident: CIT0030 doi: 10.1016/j.eswa.2014.06.027 – ident: CIT0028 doi: 10.17485/ijst/2015/v8i12/52923 – ident: CIT0022 doi: 10.1016/j.pmcj.2015.06.016 – volume: 08 start-page: 3600 year: 2016 ident: CIT0025 publication-title: International Journal of Advanced Technology and Innovative Research – ident: CIT0014 doi: 10.1016/j.ins.2016.09.005 – ident: CIT0015 doi: 10.1109/TIFS.2012.2223683 – ident: CIT0031 doi: 10.1109/TC.2013.200 – ident: CIT0004 doi: 10.1016/j.jss.2014.11.050 – ident: CIT0012 doi: 10.1109/TCC.2015.2398426 – ident: CIT0009 doi: 10.1016/j.is.2014.05.004 – ident: CIT0010 doi: 10.1109/TKDE.2016.2580139 |
| SSID | ssj0068075 |
| Score | 2.1926336 |
| Snippet | Cloud computing is the emergent technology that face one of the significant issues time with data security while outsourcing the data onto the cloud in recent.... |
| SourceID | crossref informaworld |
| SourceType | Index Database Publisher |
| StartPage | 257 |
| SubjectTerms | Covariance matrix Adaptation Evolution Strategies (CMA-ES) Efficient Elliptic Curve Public Key Encryption (EECPKE) integrity checking protocol Twofold authentication protocol |
| Title | Guarded dual authentication based DRM with resurgence dynamic encryption techniques |
| URI | https://www.tandfonline.com/doi/abs/10.1080/17517575.2018.1527041 |
| Volume | 13 |
| WOSCitedRecordID | wos000458239600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAWR databaseName: Taylor & Francis Journals Complete customDbUrl: eissn: 1751-7583 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0068075 issn: 1751-7575 databaseCode: TFW dateStart: 20070201 isFulltext: true titleUrlDefault: https://www.tandfonline.com providerName: Taylor & Francis |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8QwEA6yeNCDb3F9kYPXah9p0hxFXTzoIrri3kpeBS9Vtl3Bf-9MmsruQS8KpZDDlDKZzDcTZr4h5MyA3SiVVZECLIqYtSzSCbxEZiUYWGYT7RuF78R4XEyn8iFUEzahrBJz6KojivC-Gg-30k1fEXcBiAePyLEwq8ABPiL2resA_Xg0J6OX3hfzQLWLEhGK9D08P31lCZ2WuEsXUGe0-Q__u0U2QshJLzsb2SYrrt4h6wtEhLvkyVuKsxQ7s6jCqve6Dbd5FIHO0uvHe4qXthTy87nv2HTUduPsKSxmn9730G9O2GaPPI9uJle3URi3EJk0L9qIa15YpmWiMqsSo3MXQ6atCyeNYZxrrRlXlRM4T1O4CjIhZpk04CBSl9pUZftkUL_V7oBQHoNEnKo01YYJYQsHcQCTGYRLyAiWDMl5r-byvWPVKJNAVtprq0RtlUFbQyIXN6Ns_XVG1c0eKbNfZQ__IHtE1mApsegs4cdk0M7m7oSsmo_2tZmdelv7Av5V0Kw |
| linkProvider | Taylor & Francis |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEF6kCurBt1ife_AazWOzmz2KWiq2PWjF3sK-Ar1EaVPBf-9MHpIe9KIQAiFMCJPJfDPDzDeEXBqwG6WizFOARR6zlnk6gJOIrAQDi2ygy0HhgRiNkslEtmdhsK0Sc-isIooofTX-3FiMblrirgHy4BAxdmYluMFH-Di7vhoD1iJ__rj32nhjXpPtooiHMs0Uz0-PWcKnJfbSFu70tv_jjXfIVh110pvKTHbJisv3yGaLi3CfPJfG4izF4SyqsPE9L-qCHkWss_TuaUixbkshRV-UQ5uO2mqjPYWL2Wfpfug3Lez8gLz07se3fa_euOCZME4Kj2ueWKZloCKrAqNj50OyrRMnjWGca60ZV5kTuFJTuAySIWaZNOAjQhfaUEWHpJO_5e6IUO6DhB-qMNSGCWETB6EAkxFETEgKFnTJVaPn9L0i1kiDmq-00VaK2kprbXWJbH-NtCgrGlm1fiSNfpU9_oPsBVnvj4eDdPAwejwhG3BLYg9awE9Jp5gt3BlZMx_FdD47Lw3vC0xl1NY |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEF5ERfTgW6zPPXiN5rHdzR7FGhRrKVqxt7CvgJda2lTw3zuTbKQ96EUhBEKYECZf5sXMN4RcGMCNUkkRKPBFAbOWBTqCk0isBIAlNtLVoHBX9HrpcCj7vptw6tsqMYcuaqKIylbjzz22RdMRdwUeDw7RxsasFBf4iBBH11cgdOYI8kH22hhj7rl2USRAmWaI56fHLLinBfLSObeTbf3DC2-TTR9z0usaJDtkyY12ycYcE-Eeea6g4izF0SyqsO19VPpyHkVPZ2nn6ZFi1ZZCgj6rRjYdtfU-ewoXk8_K-NBvUtjpPnnJbgc3d4HftxCYuJ2WAdc8tUzLSCVWRUa3XQiptk6dNIZxrrVmXBVO4EJN4QpIhZhl0oCFiF1sY5UckOXR-8gdEspDkAhjFcfaMCFs6iAQYDKBeAkpwaIWuWzUnI9rWo088myljbZy1FbutdUicv5j5GVVzyjq5SN58qvs0R9kz8lav5Pl3fvewzFZhzsSG9AifkKWy8nMnZJV81G-TSdnFey-AOi004g |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Guarded+dual+authentication+based+DRM+with+resurgence+dynamic+encryption+techniques&rft.jtitle=Enterprise+information+systems&rft.au=Agarwal%2C+Neha&rft.au=Rana%2C+Ajay&rft.au=Pandey%2C+J.P.&rft.date=2019-03-16&rft.issn=1751-7575&rft.eissn=1751-7583&rft.volume=13&rft.issue=3&rft.spage=257&rft.epage=280&rft_id=info:doi/10.1080%2F17517575.2018.1527041&rft.externalDBID=n%2Fa&rft.externalDocID=10_1080_17517575_2018_1527041 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-7575&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-7575&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-7575&client=summon |